Static task
static1
Behavioral task
behavioral1
Sample
0461bd57603c7ca964dfa0a355926b6fedffb898044779d0301220c29e0f9f13.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0461bd57603c7ca964dfa0a355926b6fedffb898044779d0301220c29e0f9f13.exe
Resource
win10v2004-20240508-en
General
-
Target
0461bd57603c7ca964dfa0a355926b6fedffb898044779d0301220c29e0f9f13.exe
-
Size
112KB
-
MD5
35086d586d6f00183622da395375b600
-
SHA1
387cd92f6b7fb843128573eedc74bad34b0de9f0
-
SHA256
0461bd57603c7ca964dfa0a355926b6fedffb898044779d0301220c29e0f9f13
-
SHA512
ce114c3627a48f88fb547dab3a1bf90165aae153ab6caeb4ee49f05f26be55800253a83b7980591db2349c7ca1972baf281576212e153dea4ffb52fbaead74aa
-
SSDEEP
768:dFkcrkjuAkuo9NBKJCfa/0dPBHovapAnibWl5ZmjzYnP7RhRvx6966q2Y1rq4YLB:4Gl9TKIfaQov+AibWtKEFXvxj6qHsbB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0461bd57603c7ca964dfa0a355926b6fedffb898044779d0301220c29e0f9f13.exe
Files
-
0461bd57603c7ca964dfa0a355926b6fedffb898044779d0301220c29e0f9f13.exe.exe windows:4 windows x86 arch:x86
c0e73e4067232ce148702e3a25be8418
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
CreateDirectoryA
FindClose
FindNextFileA
CopyFileA
FindFirstFileA
GlobalFree
CloseHandle
WriteFile
CreateFileA
LockResource
GlobalAlloc
LoadResource
SizeofResource
FindResourceA
GetDriveTypeA
GetLogicalDriveStringsA
SetFileAttributesA
GetFileAttributesA
WinExec
GetVersionExA
DeleteFileA
GetProcAddress
LoadLibraryA
CreateProcessA
SetCurrentDirectoryA
GetOEMCP
GetACP
GetCPInfo
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
GetLastError
ReadFile
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
HeapAlloc
VirtualAlloc
HeapReAlloc
SetStdHandle
FlushFileBuffers
SetFilePointer
GetStringTypeA
GetStringTypeW
SetEndOfFile
shell32
SHGetSpecialFolderPathA
ShellExecuteA
Sections
.text Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ